Cyber Posture

CVE-2025-24003

High

Published: 08 July 2025

Published
08 July 2025
Modified
11 July 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
EPSS Score 0.0040 60.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24003 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Phoenixcontact Charx Sec-3000 Firmware. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of MQTT message inputs to prevent out-of-bounds writes and buffer overflows in the EichrechtAgents component.

prevent

Implements memory protection mechanisms such as stack canaries, ASLR, and DEP to mitigate exploitation of the buffer overflow vulnerability.

prevent

Ensures timely flaw remediation by applying patches for the specific buffer overflow in charging station EichrechtAgents as advised by CERT VDE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Buffer overflow in network-accessible EichrechtAgents component via unauthenticated MQTT messages directly enables remote exploitation of a public-facing service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these stations.

Deeper analysisAI

CVE-2025-24003 is a buffer overflow vulnerability (CWE-120) affecting charging stations that comply with the German Calibration Law (Eichrecht). It enables unauthenticated remote attackers to trigger out-of-bounds writes via specially crafted MQTT messages, specifically targeting the EichrechtAgents component within these stations. The vulnerability has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H), highlighting its high severity due to network accessibility, low attack complexity, and lack of required privileges.

An unauthenticated attacker with network access to the charging station can exploit this flaw by sending malicious MQTT messages, leading to a loss of integrity in the EichrechtAgents (I:L) and potential denial-of-service conditions for the affected stations (A:H). No user interaction is required, and exploitation does not impact confidentiality, making it feasible for remote adversaries to disrupt calibration compliance and station availability without authentication.

For mitigation details, security practitioners should consult the primary advisory from CERT VDE at https://certvde.com/en/advisories/VDE-2025-014, published on 2025-07-08.

Details

CWE(s)

Affected Products

phoenixcontact
charx sec-3000 firmware
≤ 1.6.5
phoenixcontact
charx sec-3050 firmware
≤ 1.6.5
phoenixcontact
charx sec-3100 firmware
≤ 1.6.5
phoenixcontact
charx sec-3150 firmware
≤ 1.6.5

CVEs Like This One

CVE-2025-25270Same product: Phoenixcontact Charx Sec-3000
CVE-2025-25271Same product: Phoenixcontact Charx Sec-3000
CVE-2025-25269Same product: Phoenixcontact Charx Sec-3000
CVE-2024-57482Shared CWE-120
CVE-2024-57479Shared CWE-120
CVE-2025-50670Shared CWE-120
CVE-2025-60554Shared CWE-120
CVE-2025-22916Shared CWE-120
CVE-2025-26004Shared CWE-120
CVE-2025-26007Shared CWE-120

References